ReClassNET / ReClass.NET-MemoryPipePluginLinks
A ReClass.NET plugin which allows direct memory access via dll injection.
☆28Updated 5 years ago
Alternatives and similar repositories for ReClass.NET-MemoryPipePlugin
Users that are interested in ReClass.NET-MemoryPipePlugin are comparing it to the libraries listed below
Sorting:
- A ReClass.NET plugin which uses the process handles of an other process to access the data of the target.☆29Updated 4 years ago
- Plugin for ReClass.Net (using vulnerable driver to read process memory)☆94Updated 6 years ago
- ☆43Updated 7 years ago
- Just my first IOCTL try☆75Updated 5 years ago
- ☆185Updated 6 years ago
- driver manual mapper☆28Updated 6 years ago
- pasted eft cheat☆112Updated 4 years ago
- Just a thing i am trying to do, testing some things out and so on. This is for a game called csgo and basically are for people how knows …☆120Updated 4 years ago
- a more stable & secure read/write virtual memory for kernel mode drivers☆161Updated 5 years ago
- ☆147Updated 5 years ago
- This x64dbg plugin sets the page protection for memory mapped views in scenarios which cause NtProtectVirtualMemory to fail.☆123Updated 8 years ago
- ☆75Updated 6 years ago
- NoBastian - Universal Ring3 IPC based BattlEye/EAC/FaceIt/ESEA/MRAC bypass☆147Updated 7 years ago
- Abusing SpeedFan driver ability of physical memory manipulation☆118Updated 7 years ago
- BattlEye BEClient<->BEService usermode emulator☆82Updated 6 years ago
- BattlEye compatible injector, done completely from user-mode.☆53Updated 2 years ago
- A customizable process dumper.☆144Updated 6 years ago
- mono fully external lib☆74Updated 2 months ago
- External mid-function hooking method to retrieve register data☆92Updated 7 years ago
- A simple kernel-level plugin for ReClass.NET☆37Updated 7 years ago
- PoC: DX11 overlay over DWM☆155Updated 5 years ago
- A mini anti-anti debug hooking library for Windows.☆106Updated 5 years ago
- This DKOM exploit enables any app in usermode to access physical memory directly☆227Updated 8 years ago
- 🥭windows memory library aimed towards game hacking☆42Updated 5 years ago
- Invoke functions with a spoofed return address. For 32-bit Windows binaries. Supports __fastcall, __thiscall, __stdcall and __cdecl calli…☆175Updated 2 years ago
- A simple program to demonstrate external signature scanning.☆70Updated 3 years ago
- Windows driver for spoofing serial number of HDDs☆220Updated 3 years ago
- Hypervisor-assisted internal League of Legends hack☆70Updated 5 years ago
- A kernelmode driver swapping a .data pointer in the kernel to perform communication between the kernel and usermode.☆143Updated 5 years ago
- ImGui DX9 example via the Steam overlay renderer☆113Updated 3 years ago